메뉴 건너뛰기




Volumn 48, Issue 2, 2012, Pages 219-262

Computing knowledge in security protocols under convergent e'uational theories

Author keywords

Formal methods; Security protocols; Static e'uivalence

Indexed keywords

ARTIFICIAL INTELLIGENCE; AUTOMATA THEORY; FORMAL METHODS; SOFTWARE ENGINEERING;

EID: 84897579297     PISSN: 01687433     EISSN: 15730670     Source Type: Journal    
DOI: 10.1007/s10817-010-9197-7     Document Type: Article
Times cited : (20)

References (26)
  • 1
    • 33750447990 scopus 로고    scopus 로고
    • Deciding knowledge in security protocols under equational theories
    • Abadi, M., Cortier, V.: Deciding knowledge in security protocols under equational theories. Theor. Comp. Sci. 387(1-2), 2-32 (2006)
    • (2006) Theor. Comp. Sci. , vol.387 , Issue.1-2 , pp. 2-32
    • Abadi, M.1    Cortier, V.2
  • 4
    • 26444497860 scopus 로고    scopus 로고
    • The avispa tool for the automated validation of internet security protocols and applications
    • Springer
    • Armando, A., et al.: The AVISPA Tool for the automated validation of internet security protocols and applications. In: Proc. 17th Int. Conference on Computer Aided Verification (CAV'05). LNCS, vol. 3576, pp. 281-285. Springer (2005)
    • (2005) Proc. 17th int. Conference on computer aided verification (cav'05). Lncs , vol.3576 , pp. 281-285
    • Armando, A.1
  • 12
    • 0034822279 scopus 로고    scopus 로고
    • An efficient cryptographic protocol verifier based on prolog rules
    • IEEE Computer Society Press
    • Blanchet, B.: An efficient cryptographic protocol verifier based on prolog rules. In: 14th Computer Security Foundations Workshop (CSFW'01), pp. 82-96. IEEE Computer Society Press (2001)
    • (2001) 14th Computer Security Foundations Workshop (CSFW'01) , pp. 82-96
    • Blanchet, B.1
  • 13
    • 26844508455 scopus 로고    scopus 로고
    • Automated verification of selected equivalences for security protocols
    • IEEE Computer Society Press
    • Blanchet, B., Abadi, M., Fournet, C.: Automated verification of selected equivalences for security protocols. In: Symposium on Logic in Computer Science, pp. 331-340. IEEE Computer Society Press (2005)
    • (2005) Symposium on Logic in Computer Science , pp. 331-340
    • Blanchet, B.1    Abadi, M.2    Fournet, C.3
  • 16
    • 84897583023 scopus 로고    scopus 로고
    • Ciobâca Ş .: KiSs
    • Ciobâca, Ş .: KiSs. http://www.lsv.ens-cachan.fr/ciobaca/ kiss (2009)
    • (2009)
  • 20
    • 31744441853 scopus 로고    scopus 로고
    • A survey of algebraic properties used in cryptographic protocols
    • Cortier, V., Delaune, S., Lafourcade, P.: A survey of algebraic properties used in cryptographic protocols. J. Comput. Secur. 14(1), 1-43 (2006)
    • (2006) J. Comput. Secur. , vol.14 , Issue.1 , pp. 1-43
    • Cortier, V.1    Delaune, S.2    Lafourcade, P.3
  • 21
    • 68249084846 scopus 로고    scopus 로고
    • Verifying privacy-type properties of electronic voting protocols
    • Delaune, S., Kremer, S., Ryan, M.D.: Verifying privacy-type properties of electronic voting protocols. J. Comput. Secur. 17(4), 435-487 (2009)
    • (2009) J. Comput. Secur. , vol.17 , Issue.4 , pp. 435-487
    • Delaune, S.1    Kremer, S.2    Ryan, M.D.3
  • 22
    • 23144432349 scopus 로고    scopus 로고
    • Analysis of an electronic voting protocol in the applied pi-calculus
    • Springer
    • Kremer, S., Ryan, M.D.: Analysis of an electronic voting protocol in the applied pi-calculus. In: 14th European Symposium on Programming (ESOP'05). LNCS, vol. 3444, pp. 186-200. Springer (2005)
    • (2005) 14th european symposium on programming (esop'05). Lncs , vol.3444 , pp. 186-200
    • Kremer, S.1    Ryan, M.D.2
  • 23
    • 84855190787 scopus 로고    scopus 로고
    • Intruder deduction for the equational theory of abelian groups with distributive encryption
    • Lafourcade, P., Lugiez, D., Treinen, R.: Intruder deduction for the equational theory of Abelian groups with distributive encryption. Inf. Comput. 205(4), 581-623 (2007)
    • (2007) Inf. Comput. , vol.205 , Issue.4 , pp. 581-623
    • Lafourcade, P.1    Lugiez, D.2    Treinen, R.3
  • 25
    • 0011828723 scopus 로고    scopus 로고
    • Receipt-free electronic voting schemes for large scale elections
    • Springer
    • Okamoto, T.: Receipt-free electronic voting schemes for large scale elections. In: Proc. 5th Int. Security Protocols Workshop, LNCS, vol. 1361. Springer (1997)
    • (1997) Proc. 5th int. Security Protocols Workshop LNCS , vol.1361
    • Okamoto, T.1
  • 26
    • 0037453396 scopus 로고    scopus 로고
    • Protocol insecurity with finite number of sessions and composed keys is np-complete
    • Rusinowitch, M., Turuani, M.: Protocol insecurity with finite number of sessions and composed keys is NP-complete. Theor. Comp. Sci. 299, 451-475 (2003)
    • (2003) Theor. Comp. Sci. , vol.299 , pp. 451-475
    • Rusinowitch, M.1    Turuani, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.